On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts...

17
On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research August 04, 2009 Thomas Holenstein Princeton University
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    213
  • download

    1

Transcript of On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts...

Page 1: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

On the (Im)Possibility of Key Dependent Encryption

Iftach HaitnerMicrosoft Research

August 04, 2009

Thomas HolensteinPrinceton University

Page 2: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

outline

Define Key Dependent Message (KDM) secure encryption scheme

Two (impossibility) results

– On fully-black-box reductions from KDM security to TDP

– On strongly-black-box reductions from KDM security to “any” hardness assumption

Page 3: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Weak Key Dependant Message Security

An encryption scheme (Enc,Dec) is KDM secure, if for any efficient A

A

h1:{0,1}n {0,1}m

Enck(h1(k))

h2

Enck(h2(k))

¼C

kÃ{0,1}n

Challenger…

A

h1:{0,1}n {0,1}m

Enck(Um)

h2

Enck(Um)

kÃ{0,1}n

Challenger

A cannot find k

What class of query functions (e.g., h) should be considered?

In most settings, we should consider any (efficient) function

Page 4: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Feasibility Results

Limited output length functions:– [Hofheinz-Unruh ‘08] based on any PKE

Family of affine functions:– [Bonhe-Halevi-Hamburg-Ostrovsky ‘08] based on DDH– [Applabaum-Cash-Peikert-Sahai ‘09] based on LPN/LWE

Efficient functions ???

Any function– [Black-Rogway-Shrimpton ‘02] based on Random Oracle

Page 5: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Our Impossibility Results (informal)

It is impossible to construct (via black-box techniques) KDM encryption scheme that is secure against

the family of poly-wise independent hash functions, based on OWF– extends to TDP

any function, based on “any assumption”

• We focus on the private key setting

• Hold also for the “many PK keys” setting

Page 6: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

outline

Define Key Dependent Message (KDM) secure encryption scheme

Our (impossibility) results

– On fully black-box reductions from KDM security to TDP

– On strongly black-box reduction from KDM security to “any” hardness assumption

Page 7: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Black-box construction

Black-box proof of security

Adversary for breaking KDM ) Inverter for breaking OWF

Fully-Black-Box Reduction from KDM security to OWF

Adversaryfor KDM

Inverterfor OWF

OWF

(Enc,Dec)

OWF

Page 8: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Black-box proof of security

A

ROWF

¼

Y Ã {0,1}n

x 2 ¼-1(y)

Breaks the KDM security of (Enc¼,Dec¼)

Page 9: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Impossibility Result for OWF Based Schemes

There exists no fully-black-box reduction from KDM-secure encryption scheme to OWF, which is secure against the family of poly(n)-wise independent hash functions

More formally:

Let (Enc(),Dec()) be a OWF based encryption scheme, and let v(n) = |Enc()(M)|, for M2{0,1}2n. Then (Enc(),Dec()) cannot be proved (in a black-box way) to be KDM-secure against Hv(n)+n – a family of (v(n)+n)-independent hash functions from {0,1}n to {0,1}2n

Page 10: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Our adversary

A

ROWF

¼

Y Ã {0,1}n

x2 ¼-1(y)

1. A breaks the (weak) KDM security of (Enc¼,Dec¼) 2. ¼ is hard to invert in the presence of A.

Proof: a la’ [Simon ‘98] /[Gennaro-Trevisan ‘01, H-Hoch-Reingold- Segev ‘07]

1n

hck

1) Select h à Hv(n)+n 2) On input C, output (the first) k

s.t. Deck(C) = h(k)

Page 11: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

outline

Define Key Dependent Message (KDM) secure encryption scheme

Our (impossibility) results

– On fully black-box reductions from KDM security to TDP

– On strongly black-box reductions from KDM security to “any” hardness assumption

Page 12: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Let ¡ be a cryptographic assumption (e.g., factoring is hard)

Arbitrary construction

Black-box proof of security.

The query function h is treated as a black box

Strongly Black-Box Reduction from KDM security to ¡

Adversaryfor KDM

Adversaryfor ¡

Page 13: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Strongly Black-box proof of security

AR for breaking

¡¡

A break the KDM security of (Enc,Dec)

Factoring is hard

n = pq

p,q

1n

hck

1. h is only accessed via its input/output interface 2. Access to h is not given to a “third party”

Page 14: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Impossibility Result for Strongly Black-Box Reductions

Assume that there exists a strongly-black-box reduction from KDM encryption scheme to ¡, which is secure against On – the family of random functions from {0,1}n to {0,1}2n. Then ¡ can be broken unconditionally

Page 15: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Our Adversary

A

Breaks the KDM security of (Enc,Dec)

1) Select h à On 2) On query C, output (the first) k

s.t. Dekk(C) = h(k)

1. A breaks the (weak) KDM security of (Enc,Dec) 2. RA,¡ can be efficiently emulated

Page 16: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

The Emulation

hÃOn

h(x1)

x1

h(x2)

x2

1. Answer to h(xi) with a random yi2{0,1}2n (while keeping consistency)

2. On query C, return (the first) xi s.t Decxi(C) = yi

Proof Idea: the probability that h(k)= Deck(C) for non-queried k, is 2-2n

c

k

A1n

h

Page 17: On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.

Further Issues

Both bounds hold for 1-1 PRF

Open questions

Prove feasibility result against larger class of functions

Extend the first impossibility result to other assumptions (e.g., “Generic Groups”)